California Unanimously Passes Historic Privacy Bill
WIRED Threat Level
JUNE 28, 2018
The law will give Californians more control over the data that companies collect on them than ever before.
WIRED Threat Level
JUNE 28, 2018
The law will give Californians more control over the data that companies collect on them than ever before.
Schneier on Security
JUNE 27, 2018
The IEEE came out in favor of strong encryption: IEEE supports the use of unfettered strong encryption to protect confidentiality and integrity of data and communications. We oppose efforts by governments to restrict the use of strong encryption and/or to mandate exceptional access mechanisms such as "backdoors" or "key escrow schemes" in order to facilitate government access to encrypted data.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
eSecurity Planet
JUNE 26, 2018
Stopping a DDoS attack quickly is critical for the survival of your business. Here are six ways you can stop a DDoS attack.
Krebs on Security
JUNE 28, 2018
Many people, particularly older folks, proudly declare they avoid using the Web to manage various accounts tied to their personal and financial data — including everything from utilities and mobile phones to retirement benefits and online banking services. The reasoning behind this strategy is as simple as it is alluring: What’s not put online can’t be hacked.
Advertiser: ZoomInfo
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
WIRED Threat Level
JUNE 27, 2018
The leak may include data on hundreds of millions of Americans, with hundreds of details for each, from demographics to personal interests.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
AIIM
JUNE 26, 2018
Now that the EU General Data Protection Regulation (GDPR) is in force organizations are ramping up their efforts to re-fresh data subject consent obtained prior to GDPR and under the EU Data Protection Directive 95/46/EC by virtue of which opt-out, or implied consent was permissible. There seems to be divergent opinions relating to the requirement to undertake re-permissioning of data subject consent under GDPR.
Krebs on Security
JUNE 26, 2018
Previous stories here on the proliferation of card-skimming devices hidden inside fuel pumps have offered a multitude of security tips for readers looking to minimize their chances of becoming the next victim, such as favoring filling stations that use security cameras and tamper-evident tape on their pumps. But according to police in San Antonio, Texas, there are far more reliable ways to avoid getting skimmed at a fuel station.
WIRED Threat Level
JUNE 25, 2018
With better password security and idiot-proof IoT connections, WPA3 will make your internet experience much, much safer.
Data Breach Today
JUNE 28, 2018
Hacker Modified JavaScript Chatbot to Scrape Customers' Card Payment Details Ticketmaster is warning customers that it suffered a data breach after an attacker modified its third-party chatbot software to steal customers' payment card details. Software provider Inbenta Technologies says Ticketmaster should never have been running the JavaScript software on a payments page.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
The Last Watchdog
JUNE 28, 2018
The use of an additional form of authentication to protect the accessing of a sensitive digital system has come a long way over the past decade and a half. Most individuals today are nonplussed when required, under certain circumstances, to retrieve a one-time passcode, pushed out in a text message to their smartphone, and then typing the passcode to gain access to a privileged account.
Troy Hunt
JUNE 25, 2018
Pretty much every day, I get a reminder from someone about how little people know about their exposure in data breaches. Often, it's after someone has searched Have I Been Pwned (HIBP) and found themselves pwned somewhere or other. Frequently, it's some long-forgotten site they haven't even thought about in years and also frequently, the first people know of these incidents is via HIBP: large @ticketfly data breach. thanks @troyhunt for the excellent @haveibeenpwned service that notifies users o
WIRED Threat Level
JUNE 27, 2018
From *Carpenter v. United States* to a landmark bill in California, privacy advocates sense a shift in what people will accept from Facebook, mobile carriers, and more.
Data Breach Today
JUNE 25, 2018
ACLU Says Decision 'Provides a Groundbreaking Update to Privacy Rights' The U.S. Supreme Court has ruled that location data generated by mobile phones is protected by the Fourth Amendment, meaning police need "probable cause" before they can access it. The ACLU says the ruling "provides a groundbreaking update to privacy rights" in the digital age.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
AIIM
JUNE 25, 2018
Artificial intelligence has the ability to change our lives for the better. Increasingly, businesses are looking to automation to complete tasks in a more cost effective and efficient manner. Unfortunately, automation may lead to job loss. In fact, the finance, manufacturing, and service industries have already cut jobs due to automation. While there are certainly risks posed by the advancement of AI, there are also several benefits.
IT Governance
JUNE 27, 2018
As another month ends, let’s look back at the data breaches and cyber attacks that have come to light in the last few weeks. Earlier this month I had a conversation about cyber security that ended with someone offering the familiar opinion: “Oh, I won’t be hacked – our website isn’t very popular”. I’m sure the owner of a Winnipeg mattress store thought that too – before they were forced to pay a criminal who shut down their servers, effectively putting a halt to services and sales.
WIRED Threat Level
JUNE 29, 2018
The ACLU has been trying to challenge the NSA's bulk surveillance for years. A hearing in *Wikimedia v. NSA* Friday could mark a breakthrough.
Data Breach Today
JUNE 27, 2018
Plea Deal Calls For Reality Winner to Serve 63-Month Sentence Reality Leigh Winner, 26, a former contractor for the NSA, has pleaded guilty to leaking a "top secret" five page document that describes Russian meddling with U.S. voting systems. She's agreed to a plea deal that calls for her to serve a 63-months prison sentence.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
The Guardian Data Protection
JUNE 26, 2018
Watchdogs reveal more data protection complaints and increase in breach notifications The first month of GDPR has seen a sharp increase in the number of complaints to regulators across Europe, showing strong public interest in the new rules. The UK’s Information Commissioner’s Office (ICO) told the Guardian it has seen a rise in breach notifications from organisations, as well as more data protection complaints following the activation of the law.
Dark Reading
JUNE 25, 2018
The Wi-Fi Alliance officially launches its latest protocol, which offers new capabilities for personal, enterprise, and IoT wireless networks.
WIRED Threat Level
JUNE 23, 2018
A good week for privacy, an alleged leaker indicted, and more security news this week.
Data Breach Today
JUNE 29, 2018
Cloud Forensics, Fraud, Extortion and Cyber Sociology Dominate Edinburgh Event What are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in Edinburgh focused on everything from securing the internet of things the rise of CEO fraud to the origins of "cyber" and how to conduct digital forensic investigations on cloud servers.
Advertiser: ZoomInfo
ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!
eSecurity Planet
JUNE 26, 2018
A DDoS attack can be costly for your business, so it's best not to give the bad guys a chance. Here are 6 ways you can prevent DDoS attacks.
OpenText Information Management
JUNE 26, 2018
If you don’t already know her, it’s time you met Saadia Muzaffar. Saadia is an incredible tech entrepreneur, author, and passionate advocate of responsible innovation. In addition, Saadia is driving forward the agenda of decent work for everyone, prosperity of immigrant talent in STEM careers, and diversity and inclusion in the Canadian technology industry.
WIRED Threat Level
JUNE 27, 2018
Kennedy’s record is mixed, but he was a thoughtful voice on how to interpret constitutional rights for the internet era.
Data Breach Today
JUNE 29, 2018
Software Engineer Profited From Breach Knowledge, Regulator Alleges An Equifax software engineer has settled an insider trading charge with the U.S. Securities and Exchange Commission after he allegedly earned $77,000 after he made a securities transaction based on his suspicion that the credit bureau had suffered a data breach.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
IT Governance
JUNE 27, 2018
2017 was a big year for data breaches. Uber , Equifax and Yahoo all fell victim, and many small organisations also suffered a breach or cyber attack. When it comes to cyber threats, all types of organisations are at risk. Using the findings of our monthly ‘list of data breaches and cyber attacks’ blog posts, we’ve created an infographic that summarises reported data breaches from 2017.
Gimmal
JUNE 28, 2018
Below is a blog post by Gimmal Director of Services Karen Goode. Karen is a valuable leader within our Services organization whose passion for process and project execution has driven some of our most successful implementations. Below, she discusses how an effective project execution framework can help organizations see through the chaos of project management and ensure consistency, efficiency, and repeatability throughout all of their processes.
The Guardian Data Protection
JUNE 26, 2018
Police are tapping the surveillance power of everyday devices like cellphones. But the US supreme court has pushed back Every time we interact with computers, smart devices or electronics, we leave detailed trails of our daily experiences. Law enforcement agencies are beginning to grasp the wealth of information new technologies provide, and courts have already made use of data from Fitbits and pacemakers.
Let's personalize your content